Остановите войну!
for scientists:
default search action
Friedrich L. Bauer
- > Home > Persons > Friedrich L. Bauer
Publications
- 2012
- [j100]Friedrich L. Bauer:
Die ALGOL-Verschwörung. Inform. Spektrum 35(2): 141-149 (2012) - 2011
- [j99]Friedrich L. Bauer:
Promotionsrecht und Rektoratsverfassung an der Technischen Hochschule München. Inform. Spektrum 34(2): 220-221 (2011) - [j98]Friedrich L. Bauer:
My years with Rutishauser. Inform. Spektrum 34(5): 514-518 (2011) - [r40]Friedrich L. Bauer:
Alberti Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 29-31 - [r39]Friedrich L. Bauer:
Alphabet. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 33-34 - [r38]Friedrich L. Bauer:
Beaufort Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 71 - [r37]Friedrich L. Bauer:
Cæsar Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 180 - [r36]Friedrich L. Bauer:
CCIT2-Code. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 188 - [r35]Friedrich L. Bauer:
Cryptanalysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 277-281 - [r34]Friedrich L. Bauer:
Crypto Machines. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 281-283 - [r33]Friedrich L. Bauer:
Cryptology. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 283-284 - [r32]Friedrich L. Bauer:
Cryptosystem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 284-285 - [r31]Friedrich L. Bauer:
Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 416 - [r30]Friedrich L. Bauer:
Information Theory. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 608-609 - [r29]Friedrich L. Bauer:
Key. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 676-677 - [r28]Friedrich L. Bauer:
Maxims. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 766 - [r27]Friedrich L. Bauer:
Playfair Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 941 - [r26]Friedrich L. Bauer:
Polybios Square Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 945-946 - [r25]Friedrich L. Bauer:
Porta Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 949 - [r24]Friedrich L. Bauer:
Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1143-1144 - [r23]Friedrich L. Bauer:
Substitutions and Permutations. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1268-1270 - [r22]Friedrich L. Bauer:
Vernam Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1359-1360 - [r21]Friedrich L. Bauer:
Vigenère Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1360 - 2010
- [b12]Friedrich L. Bauer:
Origins and Foundations of Computing - In Cooperation with Heinz Nixdorf MuseumsForum. Springer 2010, ISBN 978-3-642-02991-2, pp. I-VIII, 1-142 - 2009
- [j97]Friedrich L. Bauer:
Kettenbruch-Phänomene: Teil I: Periodische Kettenbrüche. Inform. Spektrum 32(1): 54-64 (2009) - [j96]Friedrich L. Bauer:
Kettenbruch-Phänomene: Teil II: Wechselwegnahme für transzendente Zahlen. Inform. Spektrum 32(2): 168-174 (2009) - 2008
- [j95]Friedrich L. Bauer:
Geschachtelte Wurzeln und ihre Elimination. Inform. Spektrum 31(1): 75-83 (2008) - [j94]Friedrich L. Bauer:
Der (ungerade) Collatz-Baum. Inform. Spektrum 31(2): 167-172 (2008) - [j93]Friedrich L. Bauer:
Erich Hüttenhain: Entzifferung 1939-1945. Inform. Spektrum 31(3): 249-261 (2008) - [j92]Friedrich L. Bauer:
Wallis-artige Kettenprodukte. Inform. Spektrum 31(4): 348-352 (2008) - [j90]Friedrich L. Bauer:
Über "Episoden aus den Anfängen der Informatik an der ETH" von A. Speiser. Inform. Spektrum 31(6): 600-612 (2008) - 2007
- [b11]Friedrich L. Bauer:
Kurze Geschichte der Informatik - Heinz Nixdorf MuseumsForum. Fink 2007, ISBN 978-3-7705-4379-3, pp. I-VIII, 1-131 - [b10]Friedrich L. Bauer:
Decrypted secrets - methods and maxims of cryptology (4. ed.). Springer 2007, ISBN 978-3-540-24502-5, pp. I-XII, 1-524 - [j88]Friedrich L. Bauer:
Fleissner-Raster und der Erzherzog. Inform. Spektrum 30(1): 36-38 (2007) - [j87]Friedrich L. Bauer:
Richard Hamming: Fehlerkorrigierende Codes. Inform. Spektrum 30(2): 95-99 (2007) - [j86]Friedrich L. Bauer:
Trits and Trytes - Ein früher ternärer Computer in der Sowjetunion. Inform. Spektrum 30(4): 279-284 (2007) - [j85]Friedrich L. Bauer:
epi und pie (Anläßlich des 300. Geburtstags von Leonhard Euler). Inform. Spektrum 30(5): 353-355 (2007) - [j84]Friedrich L. Bauer:
Gregory-Leibniz und Euler: Arcus-Cotangens-Relationen (Anläßlich des 300. Geburtstags von Leonhard Euler). Inform. Spektrum 30(6): 444-451 (2007) - [j83]Friedrich L. Bauer:
In memoriam John Todd (1911-2007). Numerische Mathematik 108(1): 1-6 (2007) - 2006
- [j82]Friedrich L. Bauer:
Mathematik besiegte in Polen die unvernünftig gebrauchte ENIGMA Teil 1: Vorarbeiten in Polen Im Gedenken an Marian Rejewski (* 16. August 1905). Inform. Spektrum 29(1): 53-60 (2006) - [j81]Friedrich L. Bauer:
'Simple Simon': ein früher elektromechanischer Computer. Inform. Spektrum 29(4): 296-299 (2006) - [j80]Friedrich L. Bauer:
Seit Bombelli und Cataldi: Periodische Kettenbrüche. Inform. Spektrum 29(5): 357-363 (2006) - [j79]Friedrich L. Bauer:
Frühe Zeugnisse der "software". Inform. Spektrum 29(6): 433-441 (2006) - 2005
- [j78]Friedrich L. Bauer:
De Moivre und Lagrange: Cosinus eines rationalen Vielfachen von p. Inform. Spektrum 28(2): 148-150 (2005) - [j77]Friedrich L. Bauer:
Polygraphia Nova et Universalis. Inform. Spektrum 28(3): 234-239 (2005) - [j76]Friedrich L. Bauer:
Lamberts Kettenbruch. Inform. Spektrum 28(4): 303-309 (2005) - [j75]Friedrich L. Bauer:
Pythagoräische Tripel. Inform. Spektrum 28(5): 417-423 (2005) - [j74]Friedrich L. Bauer:
Mathematik besiegte in Polen die unvernünftig gebrauchte ENIGMA Teil 1: Vorarbeiten in Polen Im Gedenken an Marian Rejewski (* 16. August 1905). Inform. Spektrum 28(6): 493-497 (2005) - [r20]Friedrich L. Bauer:
Alberti encryption. Encyclopedia of Cryptography and Security 2005 - [r19]Friedrich L. Bauer:
Alphabet. Encyclopedia of Cryptography and Security 2005 - [r18]Friedrich L. Bauer:
Beaufort Encryption. Encyclopedia of Cryptography and Security 2005 - [r17]Friedrich L. Bauer:
CCIT2-code. Encyclopedia of Cryptography and Security 2005 - [r16]Friedrich L. Bauer:
Cryptanalysis. Encyclopedia of Cryptography and Security 2005 - [r15]Friedrich L. Bauer:
Crypto Machines. Encyclopedia of Cryptography and Security 2005 - [r14]Friedrich L. Bauer:
Cryptology. Encyclopedia of Cryptography and Security 2005 - [r13]Friedrich L. Bauer:
Cryptosystem. Encyclopedia of Cryptography and Security 2005 - [r12]Friedrich L. Bauer:
Cæsar cipher. Encyclopedia of Cryptography and Security 2005 - [r11]Friedrich L. Bauer:
Encryption. Encyclopedia of Cryptography and Security 2005 - [r10]Friedrich L. Bauer:
Information Theory. Encyclopedia of Cryptography and Security 2005 - [r9]Friedrich L. Bauer:
Key. Encyclopedia of Cryptography and Security 2005 - [r8]Friedrich L. Bauer:
Maxims. Encyclopedia of Cryptography and Security 2005 - [r7]Friedrich L. Bauer:
Playfair Cipher. Encyclopedia of Cryptography and Security 2005 - [r6]Friedrich L. Bauer:
Polybios Square Encryption. Encyclopedia of Cryptography and Security 2005 - [r5]Friedrich L. Bauer:
Porta Encryption. Encyclopedia of Cryptography and Security 2005 - [r4]Friedrich L. Bauer:
Security. Encyclopedia of Cryptography and Security 2005 - [r3]Friedrich L. Bauer:
Substitutions and permutations. Encyclopedia of Cryptography and Security 2005 - [r2]Friedrich L. Bauer:
Vernam Cipher. Encyclopedia of Cryptography and Security 2005 - [r1]Friedrich L. Bauer:
Vigenére Encryption. Encyclopedia of Cryptography and Security 2005 - 2004
- [j73]Friedrich L. Bauer:
Magische Quadrate und magische Würfel - Historisch Notiz. Inform. Spektrum 27(1): 61-64 (2004) - [j72]Friedrich L. Bauer:
Theodor Fromme: Ein fast vergessener Pionier. Inform. Spektrum 27(2): 181-185 (2004) - [j71]Friedrich L. Bauer:
3.14159...2.71828... Inform. Spektrum 27(3): 276-280 (2004) - [j70]Friedrich L. Bauer:
Sackgassen und Durchbrüche. Inform. Spektrum 27(4): 354-359 (2004) - [j69]Friedrich L. Bauer:
War Hindenburg ein Feldherr? Inform. Spektrum 27(5): 467-469 (2004) - 2003
- [j67]Friedrich L. Bauer:
Konrad Zuse in Hopferau im Allgäu-Z4 und Plankalkül. Inform. Spektrum 26(5): 354-358 (2003) - [j66]Friedrich L. Bauer:
QWERTZU. Inform. Spektrum 26(6): 423-425 (2003) - 2002
- [b9]Friedrich L. Bauer:
Decrypted secrets - methods and maxims of cryptology (3. ed.). Springer 2002, ISBN 978-3-540-42674-5, pp. I-XII, 1-473 - [p3]Friedrich L. Bauer:
From the Stack Principle to ALGOL. Software Pioneers 2002: 26-42 - [p1]Friedrich L. Bauer:
Ausschnitt aus der Patentschrift: Verfahren zur automatischen Verarbeitung von kodierten Daten und Rechenmaschinen zur Ausübung des Verfahrens. Software Pioneers 2002: 67-77 - 2001
- [j65]Friedrich L. Bauer:
Claude Elwood Shannon 1916-2001 - Historische Notiz. Inform. Spektrum 24(4): 228-229 (2001) - 2000
- [b8]Friedrich L. Bauer:
Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie, 3. Auflage. Springer 2000, ISBN 3-540-67931-6 - [j64]Friedrich L. Bauer:
Marian Rejewski und die Alliierten im Angriff gegen die Enigma - Historische Notizen. Inform. Spektrum 23(5): 325-333 (2000) - [c21]Friedrich L. Bauer:
A Computer Pioneer's Talk: Pioneering Work in Software During the 50s in Central Europe. ICHC 2000: 11-22 - [c20]Friedrich L. Bauer:
Towards a Software Museum: Challenges and Opportunities. ICHC 2000: 261-262 - 1999
- [j63]Friedrich L. Bauer:
An Error in the History of Rotor Encryption Devices. Cryptologia 23(3): 206-210 (1999) - [j62]Friedrich L. Bauer:
Der typographische Punkt - Historische Notizen. Inform. Spektrum 22(1): 41-42 (1999) - [j61]Friedrich L. Bauer:
Intuitionismus und Informatik - Historische Notizen. Inform. Spektrum 22(4): 284-287 (1999) - 1998
- [j60]Friedrich L. Bauer:
Wer erfand den von-Neumann-Rechner? Historische Notizen. Inform. Spektrum 21(2): 84-89 (1998) - [j59]Friedrich L. Bauer:
Zuse, Aiken und der einschrittige Übertrag - Historische Notizen. Inform. Spektrum 21(5): 279-281 (1998) - 1997
- [b7]Friedrich L. Bauer:
Decrypted secrets - methods and maxims of cryptology. Springer 1997, ISBN 978-3-540-60418-1, pp. I-XII, 1-447 - [b6]Friedrich L. Bauer:
Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie, 2. Auflage. Springer 1997, ISBN 3-540-62632-8 - [c19]Friedrich L. Bauer:
The Might of Formulas and Their Limits. Foundations of Computer Science: Potential - Theory - Cognition 1997: 1-8 - 1996
- [j58]Friedrich L. Bauer:
Cryptological Devices and Machines in the Deutsches Museum, Munich. Cryptologia 20(1): 11-13 (1996) - [j57]Friedrich L. Bauer:
Kryptologie und Blindenschrift - Historische Notiz. Inform. Spektrum 19(1): 35-36 (1996) - [j56]Friedrich L. Bauer:
Punkt und Komma - Historische Notiz. Inform. Spektrum 19(2): 93-95 (1996) - [j55]Friedrich L. Bauer:
Zaubergemurmel - Historische Notiz. Inform. Spektrum 19(5): 268-270 (1996) - [j54]Friedrich L. Bauer:
Konrad Zuse - Fakten und Legenden. Inform. Spektrum 19(6): 299-302 (1996) - 1994
- [b5]Friedrich L. Bauer:
Kryptologie - Methoden und Maximen (2. Aufl.). Springer 1994, ISBN 978-3-540-57771-3, pp. I-XII, 1-357 - [j53]Friedrich L. Bauer:
Multiplikation und Dualsystem - Historische Notiz. Inform. Spektrum 17(4): 245-250 (1994) - 1993
- [j52]Friedrich L. Bauer:
Damals: Die kleinste Rechenmaschine der Welt - Historische Notiz. Inform. Spektrum 16(1): 45-46 (1993) - [j51]Friedrich L. Bauer:
Software Engineering - wie es begann. Inform. Spektrum 16(5): 259-260 (1993) - 1992
- [j50]Friedrich L. Bauer:
Wer baute den ersten volltransistorisierten Rechner? - Historische Notiz. Inform. Spektrum 15(1): 45-46 (1992) - [j49]Friedrich L. Bauer:
Ries und Schickard - Historische Notiz. Inform. Spektrum 15(4): 225-228 (1992) - 1991
- [j48]Friedrich L. Bauer:
Scherbius und die ENIGMA - Historische Notiz. Inform. Spektrum 14(4): 211-214 (1991) - [j47]Friedrich L. Bauer:
400 Jahr Moderne Algebra - Historische Notiz. Inform. Spektrum 14(6): 343-344 (1991) - 1990
- [j46]Friedrich L. Bauer:
In Memoriam: Andrei Petrovich Ershov. Acta Informatica 27(3): 193-194 (1990) - [j45]Friedrich L. Bauer:
The Cellar Principle of State Transition and Storage Allocation. IEEE Ann. Hist. Comput. 12(1): 41-49 (1990) - [j44]Friedrich L. Bauer:
Die Tragik des Jacques Herbrand - Historische Notiz. Inform. Spektrum 13(4): 216 (1990) - 1989
- [j43]Friedrich L. Bauer:
Nachruf auf Andrei Petrovich Ershov. Inform. Spektrum 12(6): 311 (1989) - [j42]Friedrich L. Bauer:
100 Jahre Peano-Zahlen - Historische Notiz. Inform. Spektrum 12(6): 340-341 (1989) - 1988
- [j39]Friedrich L. Bauer:
Informatik und Informationstechnik - Ein Gegensatz? Editorial. Inform. Spektrum 11(5): 231-232 (1988) - [i1]Friedrich L. Bauer:
Formal program construction by transformations computer aided, intuition guided programming. Forschungsberichte, TU Munich TUM I 8807: 1-30 (1988) - 1986
- [j38]Friedrich L. Bauer:
Heinz Nixdorf 1925-1986. Inform. Spektrum 9(2): 65-66 (1986) - 1985
- [j37]Friedrich L. Bauer:
Warum abstrakte Datentypen? Inform. Spektrum 8(1): 29-36 (1985) - [j36]Friedrich L. Bauer:
Heinz Schecher. Inform. Spektrum 8(2): 97 (1985) - [j35]Friedrich L. Bauer:
Konrad Zuse 75 Jahre. Elektron. Rechenanlagen 27(3): 129-131 (1985) - 1984
- [j34]Friedrich L. Bauer:
Editorial: Zum 65. Geburtstag von Heinz Zemanek. Elektron. Rechenanlagen 26(6): 279-280 (1984) - 1983
- [j31]Friedrich L. Bauer:
Das d'Hondtsche Verfahren. Inform. Spektrum 6(3): 165-167 (1983) - [j30]Friedrich L. Bauer:
Der formelgesteuerte Computer "Stanislaus" - 1960. Elektron. Rechenanlagen 25(6): 36-38 (1983) - 1982
- [j29]Friedrich L. Bauer:
Kryptologie - Verfahren und Maximen. Inform. Spektrum 5(2): 74-81 (1982) - [j27]Friedrich L. Bauer:
Helmut Schreyer - ein Pionier des "elektronischen" Rechnens. Inform. Spektrum 5(3): 185-188 (1982) - [j26]Friedrich L. Bauer:
Dualismen in der Informatik. Elektron. Rechenanlagen 24(4): 151-157 (1982) - [c18]Friedrich L. Bauer:
Cryptology - Methods and Maxims. EUROCRYPT 1982: 31-48 - [c17]Friedrich L. Bauer:
From Specifications to Machine Code: Program Construction through Formal Reasoning. ICSE 1982: 84-93 - 1980
- [j23]Friedrich L. Bauer:
Formulierung, Formalisierung und automatische Programmierung in den frühen Arbeiten Konrad Zuses. Inform. Spektrum 3(2): 114-119 (1980) - 1979
- [c16]Friedrich L. Bauer:
Algorithms and algebra. Algorithms in Modern Mathematics and Computer Science 1979: 421-429 - 1978
- [c15]Friedrich L. Bauer:
Design of a Programming Language for a Program Transformation System. GI Jahrestagung 1978: 1-28 - [c14]Friedrich L. Bauer:
Program Development by Stepwise Transformations - The Project CIP. Appendix: Programming Languages under Educational and under Professional Aspects. Program Construction 1978: 237-272 - [c11]Friedrich L. Bauer:
Detailization and Lazy Evaluation, Infinite Objects and Pointer Representation. Program Construction 1978: 406-420 - 1976
- [j20]Friedrich L. Bauer:
Was ist Programmtransformation? Elektron. Rechenanlagen 18(5): 229-233 (1976) - [c8]Friedrich L. Bauer:
Historical Remarks on Compiler Construction. Compiler Construction 1976: 603-621 - [c7]Friedrich L. Bauer:
Programming as an Evolutionary Process. ICSE 1976: 223-234 - 1975
- [j19]Friedrich L. Bauer:
Positivity and Norms. Commun. ACM 18(1): 9-13 (1975) - [c6]Friedrich L. Bauer:
Programming as an evolutionary process. Language Hierarchies and Interfaces 1975: 153-182 - [c5]Friedrich L. Bauer:
Appendix: a philosophy of programming. Language Hierarchies and Interfaces 1975: 194-241 - [e1]Friedrich L. Bauer:
Software Engineering, An Advanced Course, Reprint of the First Edition (February 21 - March 3, 1972). Lecture Notes in Computer Science 30, Springer 1975, ISBN 3-540-07168-7 [contents] - 1972
- [c4]Friedrich L. Bauer:
Software Engineering. Advanced Course: Software Engineering 1972: 522-545 - 1971
- [j16]Friedrich L. Bauer:
Heinz Rutishauser - † 10. 11. 1970. Computing 7(1-2): 129-130 (1971) - [c3]Friedrich L. Bauer:
Software Engineering. IFIP Congress (1) 1971: 530-538 - 1966
- [j15]Friedrich L. Bauer:
Syntaktische Struktur formaler und natürlicher Sprachen. Computing 1(2): 93-104 (1966) - 1964
- [j14]Friedrich L. Bauer:
Reply to comments by P. A. Samet and P. J. Taylor. Commun. ACM 7(7): 447 (1964) - 1963
- [j12]Friedrich L. Bauer:
Algorithm 153: gomory. Commun. ACM 6(2): 68 (1963) - 1961
- [j8]Friedrich L. Bauer:
Algorithm 60: Romberg integration. Commun. ACM 4(6): 255 (1961) - 1958
- [j1]Friedrich L. Bauer:
On Modern Matrix Iteration Processes of Bernoulli and Graeffe Type. J. ACM 5(3): 246-257 (1958)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint